Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks
|
|
- Frederick McCoy
- 6 years ago
- Views:
Transcription
1 Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China Group Meeting, Friday, August 26, 2016
2 Outline 1. Background 2. Risk-Aware Rapid Data Evacuation For Large- Scale Disasters 3. Heuristic Algorithm 4. Performance Evaluation 5. Conclusion 6. Future Work 2
3 Background Enterprises deploy their cloud services such as cloud data storage and applications in distributed datacenter (DC) networks. Cloud services require Terabytes or Petabytes of data transfer. Optical networks can be used to facilitate data transfers. Advantage: high bandwidth and low latency in inter-dc networks. Disadvantage: services can be disrupted by disasters (such as earthquakes, tornadoes, and intentional attacks). A large-scale disaster can lead to high data loss and service disruptions Japan Earthquake damaged many cloud providers data. 3
4 Background (contd.) Provide redundancy (and protection) against data loss. Distributed content/service replicas in different DCs. All replicas of a content can be lost in a large-scale disaster. Critical data must be quickly evacuated from DCs in the disaster region to safe DCs prior to the disaster. Rapid data evacuation. Receive warning of an oncoming disaster from various sensors and monitors in their network and/or from government or intelligence agencies. Depending on the type of disaster (e.g., earthquake, hurricane or weapons of mass destruction (WMD)), do the following prediction. Disaster zone Evacuation deadline Potential damage in the infrastructure Before deadline, quickly evacuate as much critical data as possible. 4
5 Background (contd.) Safe data transfers Possible independent disasters may compromise the process of data evacuation. Risk of node/link failures must be considered to ensure safe data transfers. How to objective a tradeoff between evacuation time and risk of data loss during evacuation. 5
6 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Time delay Path-computation delay. Connection-setup delay. Data-transmission delay. Data-propagation delay. Notations Distance of path: l. Number of hops on path: n. Bandwidth of path: B p Propagation delay per unit distance: μ. Processing delay: η. Switch configuration delay: β. Assume the same propagation delay for data and control messages. 6
7 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Equations Connection-setup delay Control-message processing delay: (n +1) η Control-message propagation delay: l μ Switch-configuration delay: (n + 1) β Transmission delay: F c B p Propagation delay: l μ 7
8 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) The risk of node/link failures rrrr l m /rrrr n m are the probabilities of link l or node n being damaged due to disasterm M. l L,m M(1 rrrr m l ) n N,m M (1 rrrr m n ) computes the probability that all links and nodes are not damaged by any disaster. Path failure probability: rrrr p = 1 l L,m M(1 rrrr m l ) n N,m M (1 rrrr m n ). 8
9 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Example Transfer content c1 from node C to safe DCs A or D as fast as possible. Failure probabilities of links C-D and A-C is assumed as 0.6 and 0.2. Select destination DC D Evacuation time is less but the risk along path C-D is higher. Select destination DC A Evacuation time is high but the risk along path C-D is less. 9
10 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Problem statement Objective: Achieve an optimal tradeoff between evacuation time and risk of data loss during evacuation. Given inputs: N is the set of nodes and L is the set of links. Physical topology G = (N, L). Set of possible disaster zones M. Set of predicted WMD attack zones WW. Set of DCs D. Storage capacity S d. Set of locally hosted contents C d. Number of replicas of content c R c. Importance metric of content c α c. 10
11 Risk-Aware Rapid Data Evacuation For Large-Scale Disasters (contd.) Problem statement Input: Size of content c F c. Residual link capacity B l, l L. Evacuation deadline T. Set of k-shortest paths R ii for each node pair (i, j), i, j N. Constraint: Available link capacity is limited. Data-transfer delay to be upper bounded by evacuation deadline. Different paths can be used in parallel for different connections if paths do not overlap. 11
12 Heuristic Algorithm Disaster mapping: Get a set of DCs D ww D, ww WW. // Datacenters in predicted disaster zone Get a set of DCs D ooo_ww D, D ooo_ww = D D ww. // Datacenters outside predicted disaster zone Content selection: For each DC d D ww Get a set of contents, C d, d D ww, C ww = C ww C d, ww WW. // Contents in predicted disaster zone For each content c C ww If all replicas of content c are in the disaster zone WW then Put c in a content list C EEE and get set of DCs D c, which host the replicas of c. // C EEE is a set of contents to be evacuated Sort C EEE based on α c in a descending order. 12
13 Heuristic Algorithm Destination DC selection and path delay and risk computation: For each content c C EEE For each d D ooo_ww, if F c S d then put d into list of available DCs D AAA // D AAA is a set of safe DCs with available storage Get set of k-shortest paths R ii, i D c,j D AAA For each path p R ii Obtain total delay ddddd p and risk rrrr p to calculate general cost CCCC p CCCC p = ddddd p + φ rrrr p Set path p which has minimum cost CCCC p as final solution 13
14 Performance Evaluation Simulation conditions Network topology: 24-node USNET topology. Disaster type: WMD attacks. A predicted WMD zone: WM A set of 10 possible independent disaster zones: M. Blue nodes represent safe DCs. Red nodes 6, 9, and 12 are the DCs in the WMD zone WM. 14
15 Performance Evaluation (contd.) Large storage capacity ranging from 10TB to 100TB (average occupation is assumed to be 40%). Residual link capacity is assumed to range from 500Gbps to 1Tbps (network is assumed to have 30% utilization). Number of contents is assumed to be 300. Size of each content is randomly generated within the range of [100GB, 200GB]. The contents are uniformly distributed among different DCs with the number of replicas ranging from 2 to 4. Contents are randomly assigned the importance metric α c on a scale from 1 to 10. Processing delay, propagation delay, and switch configuration delay to be 10 μs, 5 μs/km, 15 ms. 15
16 Performance Evaluation (contd.) Total risk of data loss and evacuation time Time consumption (s) Weight factor ϕ Shows the time consumption and the total risk of data loss for the RA-RDE algorithm with an increasing weight factor φ. We see that RA-RDE can significantly reduce the total risk with an increasing φ. This is reasonable since a larger weight factor can lead to higher risk reduction in the general cost Total risk of data loss 16
17 Performance Evaluation (contd.) Performance comparison Result gap compared with LD-RDE 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% Time consumption Total risk of data loss 0.00% Weight factor ϕ Compare the performance of RA-RDE with the LD-RDE algorithm which selects the least-delay paths for data evacuation without considering risk. It should be noted that the RA-RDE algorithm is equivalent to the LD-RDE scheme when φ = 0. We see that, when φ = 3, our approach reduces the total risk by 20% and needs less than 10% additional time consumption. 17
18 Performance Evaluation (contd.) Time consumption with an increasing number of contents Time consumption (s) Number of contents 18 NDE RA-RDE LD-RDE Compare time consumption of the two rapid evacuation approaches with the nearest data evacuation (NDE) approach which evacuates data only to the nearest DC. With an increasing number of contents from 100 to 500 and φ = 3, we can see that RA-RDE performs close to LD-RDE and is much better than NDE, which verifies its time efficiency.
19 Conclusion To balance performance between time consumption and total risk of data loss, we defined a general cost considering path delay and path risk using a weight factor. We develop a risk-aware rapid data evacuation scheme for largescale disasters in optical cloud networks. Results show that proposed approach significantly reduces total risk with minimal addition time consumption. Time consumption close to LD-RDE under different number of contents. 19
20 Future Work Try to propose an MILP model to solve the rapid data evacuation problem by using time slot Time slot contiguity Time slot continuity C1 C2 12 Time slot T Investigate an new heuristic algorithms with the ICC paper of Wu Yu 20
21 Thank you for your attention! Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China Group Meeting, Friday, August 26,
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationData Center Network Placement and Data Backup Against Region Failures
Data Center Network Placement and Data Backup Against Region Failures by Lisheng Ma A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Graduate
More informationTowards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu
Towards Deadline Guaranteed Cloud Storage Services Guoxin Liu, Haiying Shen, and Lei Yu Presenter: Guoxin Liu Ph.D. Department of Electrical and Computer Engineering, Clemson University, Clemson, USA Computer
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationAn Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks
An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks Peng Zeng Cuanzhi Zang Haibin Yu Shenyang Institute of Automation Chinese Academy of Sciences Target Tracking
More informationMultiple Virtual Network Function Service Chain Placement and Routing using Column Generation
Multiple Virtual Network Function Service Chain Placement and Routing using Column Generation BY ABHISHEK GUPTA FRIDAY GROUP MEETING NOVEMBER 11, 2016 Virtual Network Function (VNF) Service Chain (SC)
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationCQNCR: Optimal VM Migration Planning in Cloud Data Centers
CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,
More informationAS the increasing number of smart devices and various
1 Virtual Machine Migration Planning in Software-Defined Networks Huandong Wang, Yong Li, Member, IEEE, Ying Zhang, Member, IEEE, Depeng Jin, Member, IEEE, Abstract Live migration is a key technique for
More informationVirtual Network Embedding with Substrate Support for Parallelization
Virtual Network Embedding with Substrate Support for Parallelization Sheng Zhang, Nanjing University, P.R. China Jie Wu, Temple University, USA Sanglu Lu, Nanjing University, P.R. China Presenter: Pouya
More informationDeadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen
Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Presenter: Haiying Shen Associate professor *Department of Electrical and Computer Engineering, Clemson University,
More informationData Sheet FUJITSU Storage ETERNUS CD10000 S2 Hyperscale Storage
Data Sheet FUJITSU Storage ETERNUS CD10000 S2 Hyperscale Storage Data Sheet FUJITSU Storage ETERNUS CD10000 S2 Hyperscale Storage The hyper-scale, software-defined storage system for the cloud ETERNUS
More informationGlobal Leased Line Service
SERVICE BROCHURE Global Leased Line Service from NTT Communications Predictable, low latency global networking with the highest quality A global managed bandwidth solution from NTT Communications (NTT
More informationTime Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks
Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp
More informationCONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More informationModeling and Optimization of Resource Allocation in Cloud
PhD Thesis Progress First Report Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering January 8, 2015 Outline 1 Introduction 2 Studies Time Plan
More informationEnterprise GRC Implementation
Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More information8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1.
134 8. CONCLUSION AND FUTURE WORK 8.1 CONCLUSION Virtualization and internet availability has increased virtualized server cluster or cloud computing environment deployments. With technological advances,
More informationRailroad Infrastructure Security
TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John
More informationCrosstalk-Aware Spectrum Defragmentation based on Spectrum Compactness in SDM-EON
Crosstalk-Aware Spectrum Defragmentation based on Spectrum Compactness in SDM-EON Yongli Zhao State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications
More informationDEPARTMENT of. Computer & Information Science & Engineering
CIS-6930: Distributed Multimedia Systems Enhancing aggregate QoS for video streaming Authors: Chung wei Lee, Randy Chow, Jonathan C.L. Liu Aditi Malviya Presented By: Anubha DEPARTMENT of Computer & Information
More informationEmergency Response for Demand Response Transportation Systems
Emergency Response for Demand Response Transportation Systems Trapeze Rapid Response North America Copyright 2011 Trapeze Software Inc., its subsidiaries and affiliates. All rights reserved. March 22,
More informationMinimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks
Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department
More informationThe Impact of Control Path Survivability on Data Plane Survivability in SDN. Sedef Savas Networks Lab, Group Meeting Aug 11, 2017
The Impact of Control Path Survivability on Data Plane Survivability in SDN Sedef Savas Networks Lab, Group Meeting Aug 11, 2017 1 1 1 3 2 4 3 2 4 6 6 5 5 7 7 a) 9-node network topology, controller is
More informationScale-Out Architectures with Brocade DCX 8510 UltraScale Inter-Chassis Links
Scale-Out Architectures with Brocade DCX 8510 UltraScale Inter-Chassis Links The Brocade DCX 8510 Backbone with Gen 5 Fibre Channel offers unique optical UltraScale Inter-Chassis Link (ICL) connectivity,
More informationSimplifying Collaboration in the Cloud
Simplifying Collaboration in the Cloud WOS and IRODS Data Grid Dave Fellinger dfellinger@ddn.com Innovating in Storage DDN Firsts: Streaming ingest from satellite with guaranteed bandwidth Continuous service
More informationThe Impact of SSD Selection on SQL Server Performance. Solution Brief. Understanding the differences in NVMe and SATA SSD throughput
Solution Brief The Impact of SSD Selection on SQL Server Performance Understanding the differences in NVMe and SATA SSD throughput 2018, Cloud Evolutions Data gathered by Cloud Evolutions. All product
More informationResilient Communications: Staying connected during a disaster.
Resilient Communications: Staying connected during a disaster. A presentation by the Telecommunications Services of Trinidad and Tobago Limited (TSTT) on behalf of CANTO Agenda Resilient Telecommunication
More informationScaling to Petaflop. Ola Torudbakken Distinguished Engineer. Sun Microsystems, Inc
Scaling to Petaflop Ola Torudbakken Distinguished Engineer Sun Microsystems, Inc HPC Market growth is strong CAGR increased from 9.2% (2006) to 15.5% (2007) Market in 2007 doubled from 2003 (Source: IDC
More informationAdapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments
Adapting Enterprise Distributed Real-time and Embedded (DRE) Pub/Sub Middleware for Cloud Computing Environments Joe Hoffert, Douglas Schmidt, and Aniruddha Gokhale Vanderbilt University Nashville, TN,
More informationPresenter: Wei Chang4
Quan Yuan1, Ionut Cardei2, Jing Chen3, and Jie Wu4 Presenter: Wei Chang4 University of Texas-Permian Basin1, Florida Atlantic University2 Wuhan University3,Temple University4 } Background } Motivation
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationApplication of Cloud Computing in Hazardous Mechanical Industries
International Journal of Advancements in Research & Technology, Volume 2, Issue4, April 2013 482 By Application of Cloud Computing in Hazardous Mechanical Industries Dipankar Mishra Dept of Electronics
More informationDCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines
DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines Mohammad Noormohammadpour, Cauligi S. Raghavendra Ming Hsieh Department of Electrical Engineering University of Southern
More informationRandomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching
Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks
More informationPCAP: Performance-Aware Power Capping for the Disk Drive in the Cloud
PCAP: Performance-Aware Power Capping for the Disk Drive in the Cloud Mohammed G. Khatib & Zvonimir Bandic WDC Research 2/24/16 1 HDD s power impact on its cost 3-yr server & 10-yr infrastructure amortization
More informationNetworked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang
Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation
More informationDisaster Recovery and Mitigation: Is your business prepared when disaster hits?
1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since
More informationWhite Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017
White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of
More informationLightning Fast Rock Solid
Lightning Fast Rock Solid OceanStor Dorado V3 all-flash storage is the ideal storage solution to handle mission-critical businesses for TM enterprises and organizations. Based on Huawei's unique FlashLink
More informationCHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT
CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT This chapter discusses software based scheduling and testing. DVFS (Dynamic Voltage and Frequency Scaling) [42] based experiments have
More informationDeploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017
Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017 Virtual Network Function (VNF) Service Chain (SC) 2 Multiple VNF SC Placement and
More informationPerformance Evaluation of CoAP and UDP using NS-2 for Fire Alarm System
Indian Journal of Science and Technology, Vol 9(20), DOI: 10.17485/ijst/2016/v9i20/92603, May 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Evaluation of CoAP and UDP using NS-2 for
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationCS 498 Hot Topics in High Performance Computing. Networks and Fault Tolerance. 9. Routing and Flow Control
CS 498 Hot Topics in High Performance Computing Networks and Fault Tolerance 9. Routing and Flow Control Intro What did we learn in the last lecture Topology metrics Including minimum diameter of directed
More informationAggregation on the Fly: Reducing Traffic for Big Data in the Cloud
Aggregation on the Fly: Reducing Traffic for Big Data in the Cloud Huan Ke, Peng Li, Song Guo, and Ivan Stojmenovic Abstract As a leading framework for processing and analyzing big data, MapReduce is leveraged
More informationOn Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)
On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information
More informationNetwork Adaptability under Resource Crunch. Rafael Braz Rebouças Lourenço Networks Lab - UC Davis Friday Lab Meeting - April 7th, 2017
Network Adaptability under Resource Crunch Rafael Braz Rebouças Lourenço Networks Lab - UC Davis Friday Lab Meeting - April 7th, 2017 Outline What is Resource Crunch Problem Statement Example 1 Connection
More informationThe Storage Industry s Need for Power Efficient Storage. Marty Finkbeiner Senior Vice President Engineering Western Digital Corporation
The Storage Industry s Need for Power Efficient Storage Marty Finkbeiner Senior Vice President Engineering Western Digital Corporation Agenda Storage expansion and it s constraints EPA issues report on
More informationOn the Robustness of Distributed Computing Networks
1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,
More informationDisaster-Resilient Control Plane Design and Mapping in Software-Defined Networks
Disaster-Resilient Control Plane Design and Mapping in Software-Defined Networks S. Sedef Savas 1, Massimo Tornatore 1, 2, M. Farhan Habib 1, Pulak Chowdhury 1, and Biswanath Mukherjee 1 1 University of
More informationCANVAS DISASTER RECOVERY PLAN AND PROCEDURES
CANVAS DISASTER RECOVERY PLAN AND PROCEDURES Instructure Security, Engineering, and Operations INSTRUCTURE, INC. 6330 South 3000 East Salt Lake City, Utah 84121 Table of Contents Disaster Plan and Procedures...
More informationRouting in Delay Tolerant Networks (2)
Routing in Delay Tolerant Networks (2) Primary Reference: E. P. C. Jones, L. Li and P. A. S. Ward, Practical Routing in Delay-Tolerant Networks, SIGCOMM 05, Workshop on DTN, August 22-26, 2005, Philadelphia,
More informationWhite paper ETERNUS CS800 Data Deduplication Background
White paper ETERNUS CS800 - Data Deduplication Background This paper describes the process of Data Deduplication inside of ETERNUS CS800 in detail. The target group consists of presales, administrators,
More informationDell Compellent Storage Center and Windows Server 2012/R2 ODX
Dell Compellent Storage Center and Windows Server 2012/R2 ODX A Dell Technical Overview Kris Piepho, Microsoft Product Specialist October, 2013 Revisions Date July 2013 October 2013 Description Initial
More informationOracle NoSQL Database Overview Marie-Anne Neimat, VP Development
Oracle NoSQL Database Overview Marie-Anne Neimat, VP Development June14, 2012 1 Copyright 2012, Oracle and/or its affiliates. All rights Agenda Big Data Overview Oracle NoSQL Database Architecture Technical
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationGenetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks
Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,
More informationDynamic Grouping Strategy in Cloud Computing
IEEE CGC 2012, November 1-3, Xiangtan, Hunan, China Dynamic Grouping Strategy in Cloud Computing Presenter : Qin Liu a Joint work with Yuhong Guo b, Jie Wu b, and Guojun Wang a a Central South University,
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationOn the Robustness of Distributed Computing Networks
1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,
More informationOracle Argus Cloud Service Service Descriptions and Metrics
Oracle Argus Service Descriptions and Metrics January 25, 2018 Table of Contents Metric Definitions... 2 Case... 2 Instance... 2 Glossary... 2 Non-Production Environment... 2 Production Environment...
More informationWhat's in this guide... 4 Documents related to NetBackup in highly available environments... 5
Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...
More informationSplitter Placement in All-Optical WDM Networks
plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National
More informationSurvivable Routing in Multi-domain Optical Networks with Geographically Correlated Failures
Survivable Routing in Multi-domain Optical Networks with Geographically Correlated Failures Riti Gour, Jian Kong, Genya Ishigaki, Ashkan Yousefpour, Sangjin Hong, and Jason P. Jue The University of Texas
More informationMaster s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006
Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology
More informationTELCOM2125: Network Science and Analysis
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationAutomated Harvesting of Loss and Damage Information from Open Sources
Automated Harvesting of Loss and Damage Information from Open Sources Mao Kezhi School of Electrical and Electronic Engineering Nanyang Technological University ekzmao@ntu.edu.sg 04 August 2017 Mao Kezhi
More informationCHAPTER 4: ROUTING DYNAMIC. Routing & Switching
CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table
More informationZonal based Deterministic Energy Efficient Clustering Protocol for WSNs
Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs Prabhleen Kaur Punjab Institute of Technology, Kapurthala (PTU Main Campus), Punjab India ABSTRACT Wireless Sensor Network has gained
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationGlobal Crisis Management at Target
2011/EPWG/WKSP/008 Session 1 Global Crisis Management at Target Submitted by: Target Workshop on Private Sector Emergency Preparedness Sendai, Japan 1-3 August 2011 Global Crisis Management at Target Bryan
More informationModification of an energy-efficient virtual network mapping method for a load-dependent power consumption model
Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science
More informationConnected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu
More informationApplication Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective
Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Ruozhou Yu, Guoliang Xue, and Xiang Zhang Arizona State University Outlines Background and Motivation System Modeling
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationOutline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.)
An Energy-Efficient Distributed Algorithm for Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks Yingshu Li, Longjiang Guo, and Sushil K. Prasad Department of Computer Science, Georgia
More informationAnalysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN
Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor
More informationVirtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1. Reference Architecture
Virtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1 Copyright 2011, 2012 EMC Corporation. All rights reserved. Published March, 2012 EMC believes the information in this publication
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationIMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS
IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,
More informationCloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers
Cloud Connect Gain highly secure, performance-optimized access to third-party public and private cloud providers of the workload to run in the cloud by 2018 1 60 % Today s enterprise WAN environments demand
More informationCitrix NetScaler LLB Deployment Guide
Deployment Guide Citrix NetScaler Citrix NetScaler LLB Deployment Guide Deployment Guide for Using a NetScaler Appliance for Outbound Link Load Balancing www.citrix.com Contents Introduction... 3 Solution
More informationOptimizing Apache Spark with Memory1. July Page 1 of 14
Optimizing Apache Spark with Memory1 July 2016 Page 1 of 14 Abstract The prevalence of Big Data is driving increasing demand for real -time analysis and insight. Big data processing platforms, like Apache
More informationBasic Switch Organization
NOC Routing 1 Basic Switch Organization 2 Basic Switch Organization Link Controller Used for coordinating the flow of messages across the physical link of two adjacent switches 3 Basic Switch Organization
More informationDELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC
DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,
More informationOn the Latency-Accuracy Tradeoff in Approximate MapReduce Jobs
On the Latency-Accuracy Tradeoff in Approximate apreduce Jobs Juan F. Pérez Universidad del Rosario, Colombia Robert Birke and Lydia Chen IB Research Zurich, Switzerland IEEE INFOCO ay, 2017 J. F. Pérez,
More informationCASER Protocol Using DCFN Mechanism in Wireless Sensor Network
Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly
More informationThe Construction of Open Source Cloud Storage System for Digital Resources
2017 3rd International Conference on Electronic Information Technology and Intellectualization (ICEITI 2017) ISBN: 978-1-60595-512-4 The Construction of Open Source Cloud Storage System for Digital Resources
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series
HUAWEI TECHNOLOGIES CO., LTD. Huawei 6000 series Huawei 6000 series can detect APT (Advanced Persistent Threat) attacks, which altogether exploit multiple techniques (including zero-day vulnerabilities
More informationSome problems in ad hoc wireless networking. Balaji Prabhakar
Some problems in ad hoc wireless networking Balaji Prabhakar Background Example scenarios for ad hoc packet networks - sensor networks (many nodes, low data rates) - wireless LANs (fewer nodes, high data
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationThe Tofu Interconnect D
The Tofu Interconnect D 11 September 2018 Yuichiro Ajima, Takahiro Kawashima, Takayuki Okamoto, Naoyuki Shida, Kouichi Hirai, Toshiyuki Shimizu, Shinya Hiramoto, Yoshiro Ikeda, Takahide Yoshikawa, Kenji
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationDemand-adaptive VNF placement and scheduling in optical datacenter networks. Speaker: Tao Gao 8/10/2018 Group Meeting Presentation
Demand-adaptive VNF placement and scheduling in optical datacenter networks Speaker: Tao Gao 8/10/2018 Group Meeting Presentation Background High CAPEX and OPEX when deploying and updating network infrastructure,
More informationApplication Placement and Demand Distribution in a Global Elastic Cloud: A Unified Approach
Application Placement and Demand Distribution in a Global Elastic Cloud: A Unified Approach 1 Hangwei Qian, 2 Michael Rabinovich 1 VMware 2 Case Western Reserve University 1 Introduction System Environment
More informationRECENTLY virtualization technologies have been
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL., NO., FEBRUARY 216 1 Stochastic Load Balancing for Virtual Resource Management in Datacenters Lei Yu, Student Member, IEEE, Liuhua Chen, Student Member, IEEE,
More information